Background: With the increasing demand on esthetic orthodontic appliances, discoloration of clear elastomeric chains and modules remains an issue which concerns both orthodontics and patients. This in vitro study was conducted to evaluate the effect of exposing stretched clear elastomeric chains from six different companies (Ortho Technology, Ormco, Ortho Organizer, American Orthodontics, Opal and G&H companies) to three types of dietary media (tea, coffee and turmeric). Materials and methods: A total of 960 lengths of six modules were cut from short type elastomeric chain; 160 pieces from each brand. The specimens were stretched 50%, placed on plastic boards, and incubated in water at 37°C for 1 day, 7 days, 14 days and 28 days. Once a day, the specimens were immersed for ten minutes in the testing dietary media, washed and then returned back to the water container. Color measurements were made before and after incubation of the specimens. Digital image were taken by an SLR digital camera and the color changes were calculated according to CIE L*a*b* color space system by Adobe Photoshop program. The resulting data were statistically analyzed using ANOVA and LSD tests. Result: Elastomeric chains from AO, Opal and G&H companies were the most brands prone to discoloration. Ortho Organizers and Ortho Technology chains were the least prone to discoloration. Tea, coffee and turmeric solutions discolored elastomeric chains from all companies in a variable degree, however turmeric caused significantly more discoloration, followed by tea and least by coffee. The amount of discoloration caused by tea and coffee increases gradually to peak at 28 days, while most of the discoloration caused by turmeric was in the first day and reached a plateau in a week. Conclusion: To decrease the discoloration of clear elastomeric chains the consumption of colored dietary media especially spices like turmeric are to be discouraged.
The Diffie-Hellman is a key exchange protocol to provide a way to transfer shared secret keys between two parties, although those parties might never have communicated together. This paper suggested a new way to transfer keys through public or non-secure channels depending on the sent video files over the channel and then extract keys. The proposed method of key generation depends on the video file content by using the entropy value of the video frames. The proposed system solves the weaknesses in the Diffie-Hellman key exchange algorithm, which is MIMA (Man-in-the-Middle attack) and DLA( Discrete logarithm attack). When the method used high definition videos with a vast amount of data, the keys generated with a large number up to 5
... Show MorePeople are comfortable with e-banking services, but they are exposed to a great deal of danger these days due to fraudulent acts such as password hacking and personal information theft. Everything individuals do online relies heavily on passwords. Using a password protects one's identity online, in forums, and through email. Online transactions are vulnerable to identity theft if they do not have a secure password. Internet users with critical statements are vulnerable to various assaults, including the theft and exploitation of user IDs and passwords. This paper introduces novel password encryption by fingerprint and a random number to make each password unique and robust against attacks, with a magnificent time elapsed o
... Show MoreRecognizing facial expressions and emotions is a basic skill that is learned at an early age and it is important for human social interaction. Facial expressions are one of the most powerful natural and immediate means that humans use to express their feelings and intentions. Therefore, automatic emotion recognition based on facial expressions become an interesting area in research, which had been introduced and applied in many areas such as security, safety health, and human machine interface (HMI). Facial expression recognition transition from controlled environmental conditions and their improvement and succession of recent deep learning approaches from different areas made facial expression representation mostly based on u
... Show MoreLet be a ring. Given two positive integers and , an module is said to be -presented, if there is an exact sequence of -modules with is -generated. A submodule of a right -module is said to be -pure in , if for every -Presented left -module the canonical map is a monomorphism. An -module has the -pure intersection property if the intersection of any two -pure submodules is again -pure. In this paper we give some characterizations, theorems and properties of modules with the -pure intersection property.
In this study, dynamic encryption techniques are explored as an image cipher method to generate S-boxes similar to AES S-boxes with the help of a private key belonging to the user and enable images to be encrypted or decrypted using S-boxes. This study consists of two stages: the dynamic generation of the S-box method and the encryption-decryption method. S-boxes should have a non-linear structure, and for this reason, K/DSA (Knutt Durstenfeld Shuffle Algorithm), which is one of the pseudo-random techniques, is used to generate S-boxes dynamically. The biggest advantage of this approach is the production of the inverted S-box with the S-box. Compared to the methods in the literature, the need to store the S-box is eliminated. Also, the fabr
... Show MoreIn this research article, an Iterative Decomposition Method is applied to approximate linear and non-linear fractional delay differential equation. The method was used to express the solution of a Fractional delay differential equation in the form of a convergent series of infinite terms which can be effortlessly computable.
The method requires neither discretization nor linearization. Solutions obtained for some test problems using the proposed method were compared with those obtained from some methods and the exact solutions. The outcomes showed the proposed approach is more efficient and correct.
The purpose of this research is to improve the organizational performance of the Oil Projects Company by adopting an approach to strategic change، and finding appropriate solutions to the problems facing the company. The researcher adopted in designing his research by conducting a survey of previous literature that dealt with approaches to strategic change، as the results of the survey showed that most researchers agree on the approach of renewal and modernization، Which formed a starting point for the researcher to identify the extent of the company's management interest in renewal and modernization to improve its level of performance، and the quality of the procedures followed on the ground that is related to
... Show MoreThe identity of the cultural identity of the party (the ego and the other) during a series of questions subject to the transformations of history and the process of culture, the search of identity and its characteristics within the novel discourse calls to address the cultural impact communication discourse aims to reveal the functional and intellectual benefits that contributed to the formation of cultural identity, and stand at the most important manifestations And the secretions that mimic a world remains part of it present in the imagination of the producer of the text is moving in accordance with the holistic perception of the world embedded between the lines of the trial.The question of identity as an intellectual dimension in orde
... Show More